Western New England University School of Law Digital Commons @ Western New England University School of Law

Faculty Scholarship Faculty Publications

2015 The nitU ed States, in COMPARATIVE COUNTER-TERRORISM Sudha Setty Western New England University School of Law, [email protected]

Follow this and additional works at: http://digitalcommons.law.wne.edu/facschol Part of the Comparative and Foreign Law Commons, and the National Security Law Commons This Book Chapter, The , is in Comparative Counter-Terrorism edited by Kent Roach (Cambridge University Press, 2015). The publication is in copyright, subject to statutory exception and to the provisions of relevant collective licensing agreements; no reproduction of any part may take place without the written permission of Cambridge University Press. Website: http://www.cambridge.org/us/academic/subjects/law/ comparative-law/comparative-counter-terrorism-law?format=HB

Recommended Citation Sudha Setty, The nitU ed States, in COMPARATIVE COUNTER-TERRORISM (Cambridge University Press 2015), edited by Kent Roach.

This Book Chapter is brought to you for free and open access by the Faculty Publications at Digital Commons @ Western New England University School of Law. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Digital Commons @ Western New England University School of Law. For more information, please contact [email protected]. 2

The United States

Sudha N. Setty

I. INTRODUCTION

The terrorist attacks of September n, 2001, which killed almost three thousand civilians, led to profound changes in societal viewpoints, political agendas, and the legal authority to combat terrorism and threats of terrorism. The United States, like all other democratic nations that have suffered terrorist attacks, continues to struggle with questions of how to keep its population safe while maintaining the principles of democracy and the rule oflaw that are essential to the nation's character. In the twelve years since the attacks of September n, Congress, the executive branch, and the judicial system have reacted strongly to the need to protect against future national security threats by giving more powers to the police, military, and intelligence forces to investigate potential threats and neutralize them before another attack occurs. Some of the these changes occurred in response to United Nations Security Council resolutions,' but many have been domestically motivated shifts that reflect the will of politicians and the polity as a whole. The expanded powers accorded to these counterterrorism programs have - in the view of many critics- allowed for government infringement on civil liberties and human rights in significant and corrosive ways, with little or no accountability for such overreaching. In the years immediately following the attacks of September n, the Bush administration asserted both inherent presidential authority and broad powers conferred under the Authorization for the Use of Military Force' and the USA

The author thanks Matthew H. Charity and Lauren Carasik for thoughtful comments and suggestions, and Kelly Heuser for fine research assistance.

UN Security Council Resolution 1373 has played a strong role worldwide in developing a concerted counter-terrorism effort. The United States played a significant role in supporting the language and passage of Resolution 1373 and encouraging its worldwide mandate. See Kim Lane Scheppele, Other People's Patriot Acts: Europe's Response to September 11, 50 LOY. 1.. REI' 89, 91-2 (2004). ' Authorization for Use of Military Force !AUMF), Pub. L. 107-40, codified at 115 Stat. 224 (Sept. 18, 2001).

49 so Sudha N. Setty

PATRIOT Act.l The government conducted warrantless wiretapping surveillance, detained thousands of individuals- almost all of whom were Muslim- who were later released based on lack of evidence of any connection to terrorism, conducted extraordinary renditions to capture and transport suspected individuals from one country to another without judicial oversight, and resorted to on some detainees as an interrogation and control technique. Some of these issues were eventually resolved- through public pressure, judicial intervention, and/or a change in political branches - in ways that improved the individual rights of detainees, suspects, and the public. Yet robust presidential authority and extremely high levels of secrecy continue to be the norm, and the nation's policy makers still struggle with how best to maintain security, accountability, and the rule of law.

II. THE DEFINITION OF TERRORISM

Terrorism is defined in numerous ways under U.S. law, but contains several basic elements: premeditation, political or religious motivation, perpetration of violence, noncombatant targets, and actors as subnational groups or clandestine agents.4 The United States has not made any exceptions to this definition based on the activity being expressive in character or with regard to national liberation struggles.5 The USA PATRIOT Act, passed in the weeks immediately following the September n attacks, offers both greater counterterrorism resources and more flexibility in implementation to the government, including increased surveillance powers,6 increased government authority to conduct intelligence-gathering operations in matters of suspected terrorism,? the power of civil seizure of assets based only on

l Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, Pub. L. No. 107-56, 115 Stat. 272 (codified as amended in scattered sections of U.S.C.) (hereinafter PATRIOT Act). 4 E.g., 22 U.S.C.A. § 2656f(z)(d) (2) (WEST) (defining terrorism for the purpose of the State Department's annual report to the Speaker of the House and the Senate Committee on Foreign Relations as "premeditated, politically motivated violence perpetrated against noncombatants by subnational groups or clandestine agents"); see Third Mutual Evaluation Report on Anti-Money Laundering and Combating the Financing ofTerrorism: United States of America (Financial Action Task Force, Paris, France) June zoo6, at 40, available at http://www.fatf-gafi.org/countries/u-z/unitedstates/documents/ mutualevaluationoftheunitedstates.htrnl (offering similar elements of a definition of terrorism for the purposes of evaluation under the Immigration and Nationality Act [Title 8 USC n8z(a)(3)(B)(iv)]). See Sudha Setty, What's in a Name: How Nations Define Terrorism Ten Years After 9/n (2on), 33 u. PA. ). INT'L L. 1. 6 See PATRIOT Act § 218 (amending the Foreign Intelligence Surveillance Act of 1978 such that electronic surveillance and physical searches need only be justified in "significant" part by the goal of obtaining foreign intelligence). PATRIOT Act § 901. The United States 51 probable cause,8 and heightened punishments for any of the underlying crimes related to the newly broadened understanding of "domestic terrorism," which includes:

[A]cts dangerous to human life that are a violation of the criminal laws of the United States or of any State [that] appear to be intended to intimidate or coerce a civilian population; to influence the policy of a government by intimidation or coercion; or to affect the conduct of a government by mass destruction, assassination, or kidnapping; and occur primarily within the territorial jurisdiction of the United States.9

This definition of domestic terrorism was the result of intense pressure on Congress'0 to amend various existing criminal statutes to broaden and strengthen the government's resources before another attack potentially took place." The PATRIOT Act amended the definition of terrorism from 18 U.S.C. § 2331 to broaden its scope and application further,l2 but included an important sunset provision - added in part because of the haste with which the legislation was passed - that forced Congress to reexamine the legislation at intervals of several years.'3 Although Congress debated the renewal of certain parts of the PATRIOT Act in 2005 - none of which involved the definition of terrorism - in March 2oo6, Congress renewed most provisions, removed the safeguard of a sunset provision, and made the provisions permanent.'4

8 PATRIOT Act % 8o6. 9 PATRIOT Act S802. Critics of this broad definition have noted that such language could encompass numerous activist groups, including Greenpeace, protestors of the World Trade Organization, Operation Rescue, and protesters of bomb-testing facilities on the island of Vieques. See How the USA PATRIOT Act Redefines "Domestic Terrorism," AM. CIV. LIBERTIES UNION (December 6, 2002), available at http://www.aclu.org/national-securitylhow-usa-patriot-act-redefines-domesticterrorism. w See Laura K. Donohue, THE COST OF COUNTERTERRORISM: POWER, POLITICS AND LIBERTY n(New York, Cambridge University Press, 2oo8) (arguing that the legislative role in safeguarding civil liberties is hampered by political imperatives). n See Robert O'Harrow, Jr., Six Weeks in Autumn, WASHINGTON POST MAGAZINE, October 27, 2002, at 6, 10 (describing the pressured deliberations of Congress and the executive branch in drafting the Patriot Act). " See 18 U.S. C. S2331 (including "mass destruction" as a means by which terrorists operate). •J See 18 U.S. C. § 2510 (commenting that Section 801 of Pub. L 90-351 provided a sunset provision for various counter-terrorism tools, including those related to wiretapping and surveillance). '4 See James Beckman, Comparative Legal Approaches to Homeland Security and Anti-Terrorism 31 (Farnham, UK: Ashgate, 2007) (describing how sunset provisions were adopted, extended, and then removed). Only three provisions not dealing with the definition of terrorism were still kept subject to the sunset provisions. Those provisions were extended in May 2011 until2015. See Paul Kane & Felicia Somnez, PATRIOT Act Amendments Signed into Law Despite Bipartisan Resistance from Congress, washpost.com, May 27, 2011, http://www.washingtonpost.com/politics/patriot-act-extension-signed­ i nto-law-despite-bipartisan-resistance-incongresshon/o5f27 /AGb VlsCH_story.htrnl (describing the extension of surveillance provisions of the PATRIOT Act). )2 Sudha N. Setty

The current PATRIOT Act definition of terrorism has a broad scope, and its reach exacerbates the uncertainty surrounding the application of conflicting definitions of terrorism, including the potential lack of notice to individuals as to whether they will be categorized as a terrorist and exactly what kind of conduct is prohibited.''

III. CRIMINAL LAWS AND PROSECUTIONS

A. Criminal Law

Terrorist acts are often prosecuted using the ordinary criminal justice system, particularly when the alleged crime occurred domestically. Statutes such as the Anti-Effective Death Penalty Act (AEDPA) of 1996'6 and the PATRIOT Act were enacted as specific responses to terrorist acts and to enable investigation and prosecution of activities that were not previously criminalized. A serious constitutional issue has been raised with regard to a number of U.S. statutes that criminalize speech-related conduct that supports or encourages violent acts, including terrorist acts. The federal criminal solicitation'! and sedition statutes,'8 for example, authorize such prosecution. However, the most widely used statute in this

'' See Subcomm. on Terrorism and Homeland Sec. & House Permanent Select Comm. on Intelligence, 107th Cong., Counterterrorism Capabilities and Performance Prior to 9-11: A Report to the Speaker of the House of Representatives and the Minority Leader (2002), available at http://www.fas.org/irp/ congresshoo2_rpt/hpsci_thso7o2.html (reviewing alternative ways to combat terrorism in order to prevent future attacks). The subcommittee's recommendation that a single definition of terrorism be agreed upon by all U.S. agencies was predicated on a concern that a lack of uniform definition would lead to terrorist acts being treated identically under the law as ordinary criminal acts. ld. '6 Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA), Pub. L. No. 104-132, 110 Stat. 1217 (codified in scatter sections of8,18, and 28 U.S.C.). '' See 18 U.S.C. ~ 373(a) (criminalizing solicitation of crimes). See also Letter from the Chairman of the Security Council Committee Established Pursuant to Resolution 1373 (2001) Concerning Counter-terrorism Addressed to the President of the Security Council (June 15, 2oo6), Enclosure: Response of the United States of America to the Counter-Terrorism Committee: United States implementation of Security Council resolution 1624 (2005), at s-6, available at http: I /daccess-dds-ny. u n. org/doc/UN DOC/G EN IN o6/3 95/z4/PD FIN 0639524. pdf?OpenEl em en t (hereinafter "U.S. CTC Response 2oo6") (citing the availability of 18 U.S.C. \ 2332[b] [acts of terrorism, such as murder, maiming, or kidnapping, transcending national boundaries], 18 U.S. C. \ 2332f [bombings of places of public use], and 49 U.S.C. ~ 46502 [aircraft piracy] in prosecuting support of terrorism). 18 U.S. C. 2384 prohibits seditious conspiracy (plotting to use force to overthrow the government). 18 U.S. C. S2385 proscribes teaching or advocating the duty or necessity of overthrowing or destroying the govemment of the United States by force or violence; publishing or circulating literature which so teaches or advocates; joining or organizing any group which so teaches or advocates, knowing the purposes thereof; or conspiring to do any of the foregoing. See U.S. CTC Response 2oo6, supra note 17 (discussing the availability of these statutes in the counterterrorism context); US. v. Rahman, 189 F. 3d 88, 116-117 (2nd Cir. 1999) (upholding the solicitation conviction of Sheik Omar Amad Ali Abdel Rahman based on his exhortations for others to bomb New York Citv facilities and to assassinate certain persons). The United States 53 area criminalizes material support of terrorism. Sections 2339A and 2339B of Title 18 of the U.S. Code prohibit knowingly or intentionally providing, attempting to provide, or conspiring to provide material support or resources to a terrorist organization, defining the term "material support or resources" to include

... any property, tangible or intangible, or service, including currency or monetary instruments or financial securities, financial services, lodging, training, expert advice or assistance, safehouses, false documentation or identification, communications equipment, facilities, weapons, lethal substances, explosives, personnel (1 or more individuals who may be or include oneself), and transportation, except medicine or religious materials.'9

Material support charges have been used extensively to try terrorism suspects or to exert pressure toward a plea bargain and are often successful. 20 Unlike other crimes often invoked to prosecute terror suspects, such as continuing criminal enterprise' and violations of the Racketeer Influenced and Corrupt Organizations Act, 22 which require at least some predicate act for criminal liability to attach,2 3 the material support statute does not require the defendant to have had a specific intent to support a terrorist act; knowing support of a designated terrorist organization without intent is sufficient to convict.24 The scope and flexibility offered by the material support statute has made it an often-used tool for prosecutors and was used to convict John Walker Lindh,25 Ahmed Omar Abu Ali, 26 and the "Lackawanna Six,"z; among others. In 2010, the U.S. Supreme Court decided that the statute does not unconstitutionally infringe on the expressive rights of individuals.28 In some respects, this decision

'9 See 18 U.S. C. H 2339A and 2339B. See Press Release, Dep't of justice, Fed. Bureau of Investigation, Minneapolis, Minneapolis Man Sentenced for Conspiracy to Provide Material Support to al Qaeda (July 9, 2009), available at http:// minneapolis.fbi.gov/dojpressreVpressrelo9/mpo7o9o9.htm (last visited October 19, 2010) (describing the guilty plea of Mohammed Abdullah Warsame to charges of material support for al Qaeda, which resulted in a prison sentence of ninety-two months); Philip Coorey, Hicks CaRe Flawed AI/ ;\long; Prosecutor, SYDNEY MORNING HERALD (April 30, 2oo8), available at http://www.smh.com .auJarticlesl2oo8/o4J'29ir2o92348628n.html (last visited October 19, 2010) (detailing ' guilty plea to material support charges). " 21 U.S.C. %848 (2oo8). " 18 U.S.C. SS 1961-1968 (2ooo). '' See, e.g., r8 U.S. C. S1961( 5) (2oo8) (defining racketeering as involving at least two acts in furtherance of the illegal plan). '" 18 U.S. C. 5 2339B(a)(l) (2ooo). United States v. I .indh, 227 F. Supp. 2d 565 (E.D. Va. 2002) (entering guilty plea in violation of. among other things, the material support statute). ' 6 United States v. i\bu i\li, 528 F. 3d 210 (4th Cir. 2oo8), cert. denied, 129 S. Ct. 1312 (2009). ''Press Release, U.S. Dep'l of Justice, U.S. Attorney, W. Dist. of N.Y., United States Attorney's Office Successfully Concludes Terrorism Case with Sixth Conviction of a! Qaeda Supporter," May 19, 2003 (announcing the conviction ofMuhktar al-Bakri). '' See II older v. llumanitarian Law Proiect, 130 S. Ct. 2705 (2010). 54 Sudha N. Setty promoted additional uncertainty as to what individuals and organizations will be prosecuted under the material support statute and on what basis. 2 9 The United States government maintains, however, that the majority of the terrorist propaganda found on the Internet today could not be prosecuted under U.S. criminal law, and that even a website advocating committing acts of terrorist violence likely lacks (at least without proof of additional facts) the potential to produce imminent lawless action that could be criminalized.lo

B. Terrorism Prosecutions

The United States has historically shied away from specialized trials for terrorist attacks, instead relying on the criminal justice systemY In part, this policy is intended to affirm the rule of law in the United States and to maintain the United States' reputation in the international community for fairness toward criminal defendantsl' regardless of the crime committed or the national origin or religion of the defendant.ll One critique of the criminal justice system with regard to terrorism prosecutions has been the de facto unavailability of the entrapment defense. In evaluating an entrapment defense, most courts will consider whether the defendant was induced into illegal acts by law enforcement or had, to the contrary, a predisposition to commit the crime even if law enforcement had not intervened. In the context of a terrorism prosecution, a defendant's predisposition toward terrorist acts is often inferred from the defendant's political and religious views or sympathies toward those of the same political bent or religious background who have engaged in terrorist activities.l4 In the post-9/n context, there has not been one publicly known

' 9 See Peter Margulies, Advising Terrorism: I-!ybricl Scrutiny, Safe I-! arbors, and Freedom of Speech (zan) 63 HASTINGS LJ 455 at 498 (arguing that the majority opinion failed to specify how much coordination with a foreign terrorist organization would lead to a violation of the federal statute prohibiting material support to these organizations). 1" U.S. CTC Response 2006, supra note 17, at 4-5. 1' Sudha Setty, Comparative Per.~pectives on Specialized Trials for Terrorism (zow) 63 ME. L. REV. 131. 1' This reputation for a justice system with exceptionally strong protections for defendants is open to critique. See James Forman, Jr., Exporting Harshness: How the War on Crime Helped Make the Possible (2009) 33 NYU RE\. L ci soc. CHANCE 331 at 337 ("we hav[e] one of the most punitive systems in the world while believing we have one of the most liberal"). ll Deborah Colson, THE CASE AGAINST A SPECIAL TERRORISM COURT, HUMAN RIGHTS FIRST, at 3 (zoo9 ("Unjust detentions and trials at Guantanamo have fueled animosity toward the United States. These decisions also have undermined U.S. efforts to advance the rule of law around the world, which is critical to confronting the threat of terrorism. Creating a special terrorism court. would perpetuate these errors"). 14 Wadie E. Said, The Terrorist Informant (2010) 85 Wash. L. Rev. 687 at 698-711. The United States 55 instance of a successful entrapment defense in a terrorism case,l5 despite ample evidence of law enforcement inducing defendants toward illegal activities.l6 Since September 2001, numerous alternative venues to criminal trials have been proposed and sometimes used. The creation of a specialized national security court has been advocated by some on the political left and right as a means to professionalize and depoliticize the process of adjudicating terrorism trials while also protecting the classification of secret documentsY However, such proposals have been met with concern and have not been implemented. The Bush administration made a decision soon after September 2001 to use military commissions to try those who were designated by the administration as "enemy combatants." The military commission system has been through several iterations in the intervening thirteen years, but relatively few defendants have actually been tried in this systern.J8

C. Punishment ofTerrorism

Prior to the passage of the AEDPA in 1996, sentencing for crimes involving terrorism fell within the range dictated under ordinary criminal law, since defendants usually faced charges based on violent criminal activity, regardless of any political motivations. Upon the passage of the PATRIOT Act, Congress authorized enhancements to the sentencing for numerous terrorism-related crimes.39 As a result, sentences for such crimes increased significantly, even in situations where there was no direct link to an act of violence, such as material support for terrorism.4° The existence of a terrorism sentencing enhancement also serves as a statutory basis for appellate courts to overturn sentences as too lenient, as has occurred in high-profile prosecutions, such as those of Ahmad Abu Ali, Lynne Stewart, and Jose Padilla.4'

1s See Ctr. on Law 6 Security, N.Y. llniv. Sch. of Law, Terrorist Trial Report Card: September 11, 2001-September 11, 2ou, 26 (2011), available at http://www.lawandsecmity.org/Portals/o/Documents/ TTRC%zoTen%2oYear%zolssue.pdf. 16 See Paul Harris, F'ake Terror Plots, Paid lnfomwnts: The Tactics of FBI 'Entrapment' Questioned, theguardian.com, November 16, 2ou, available at http://www.theguardian.com/world/zon/nov!I6/ fbi-entrapment-fake-terror-plots (arguing that the FBI has concocted terrorism plots, lured and enabled individuals to participate, and then arrested them in order to justify the expansion of the government's counter-terrorism powers). '' See Jack Goldsmith and Neal Katyal, The Terrorists' Court, nytimes.com, July n, 2007, available at http://www.nytimes.com/zoo7/o7/J1/opinion/nkatyal.html?_r=o. ,s See Part !X.A, infra, for a discussion of the U.S. military commission system. N See U.S. Sentencing Guidelines Manual, appendix A (sentencing table) (2011). 40 The penalty for conviction is a sentence of up to fifteen years in prison, rising to life in prison if the material support results in death. 18 U.S. C. S 2339B (2oo6). 4 ' See United States Stewart, 686 F.3d 156 (2d Cir. 2012); United Stales v. Ahu Ali, 528 F. 3d 210 (4th Cir zooS). Sudha N. Setty

IV. INVESTIGATIVE POWERS

A. Police Powers

The USA PATRIOT Act and other legislation in the post-9/n context increased the powers of federal law enforcement authorities such as the Federal Bureau of Investigation (FBI). This has led to increased surveillance and investigation, as well as a significant number of arrests of alleged terrorists. The government has maintained that its efforts have prevented planned terrorist acts from occurring+' and has elicited valuable counterterrorism and intelligence information as part of the interrogation, negotiation, and plea bargain process.43 The federal material witness statute, which empowers the government to detain and question individuals without charge,44 has enhanced the ability oflaw enforcement to detain individuals with potentially relevant information for terrorism prosecutions, but it has also increased the potential for abuse of discretion and abuse of executive power.45 For most46 covert counterterrorism-related surveillance, the FBI is obligated to follow requirements under the Foreign Intelligence Surveillance Act (FISA) to seek judicial approval from the Foreign Intelligence Surveillance Court (FISC). Under FISA, law enforcement officials must meet the standard of probable cause to garner a warrant for surveillance, a standard that the government meets in almost all cases.47 Law enforcement officers must undertake a minimization process by which they attempt to ensure that individuals and communications that are not targets of

4' See, e.g., Sarah Kershaw, Terrorist in '99 US. Case Is Sentenced to 22 Years, NY TIMES, July 28, 2005, available at http://query.nytimes.com/gstlfullpage.htrm?res=9Ao7E7DClo3FF93BAl5754COA9639 C8B63 (describing the detention of Ahmed Ressam two weeks prior to the execution of his planned attack). 43 See Jeff Zeleny and Charlie Savage, Official Says Terrorism Suspect Is Cooperating, NY TIMES, February 3, 2010, at Au (noting that Umar Farouk Abdulmutallab, arrested in conjunction with his alleged attempt to use explosives on a United States-bound airline flight on December 25, 2009, cooperated with law enforcement and offered valuable information pertaining to al-Qaeda). 44 See 18 U.S.C. § 3144 (2ooo). " The government used the material witness statute broadly after the terrorist attacks of September n, 2001, arresting hundreds of people and detaining them for up to several months. See, e.g., al-Kidd v. Ashcroft, 58o F. 3d 949 (9th Cir. 2009); Elmaghraby v. Ashcroft, No. 04 CV 01809 JG SMG, 2005 WL 2375202, at *2 (E.D.NY September 27, 2005). 46 National Security Letters, used over one hundred thousand times by the Bush administration, circumvented judicial oversight altogether. Instead, they were subpoenas by the FBI seeking information on a target from third parties such as banks or employers, while implementing a gag order on the recipients of the subpoenas. See generally Shirin Sinnar, Protecting Rights from Within? Inspectors General and National Security Oversight (2013) 65 STAN. L REV. 1027. 47 See David Kravets, Domestic Surveillance Court Approved All 1,506 Warrant Applications in 2010, wired. com, May 6, 2011, available at http://www. wired.com/threatlevelfzoH/o5/domestic-surveillance/. The United States 57 investigation are excluded from surveillance.48 Much of the information garnered pursuant to an FISC warrant is usable in court. FISA has been amended several times since its enactment in 1978, with the most recent amendments in zooS allowing for broader surveillance authority and immunizing telecommunications companies that work with law enforcement to enable surveillance from civilliability.49 The FBI's police powers have also generated a high level of scrutiny of immigrant populations within the United States. The lowered due process protections accorded to immigrants allow for a more searching and a less privacy-protective approach. Lawyers cite the presence of FBI agents during immigration proceedings, Immigration and Custom Enforcement's (ICE) reliance on statements made in old FBI interviews in its decisions, and the FBI's submission of prejudicial affidavits raising national security concerns without providing the basis of the allegations. FBI agents have used the structural power imbalances inherent in the immigration processes to coerce Muslim immigrants into becoming informants or to retaliate if they refuse.5° State and local police agencies have worked on counterterrorism issues, often in conjunction with federal law enforcement agencies. Joint Terrorism Task Forces (JTTFs )'' are arrangements in which a local police department assigns a number of officers to work on a terrorism-related task force with FBI agents;'2 federal agents offer access to powerful investigative tools, whereas police departments offer local knowledge and engagement in community policing.'l Over one hundred American cities participate in JTTFs,54 despite occasional concerns that the JTTFs engage in

48 See, e.g., 50 U.S.C. § 1801(h) (2oo6) (directing the use of minimization procedures to "minimize the acquisition and retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons"). 49 Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, Pub.L. 110-261 (enacted July 10, 2008). ;o Ctr. for Human Rights and Global Justice, Asian Am. Legal Def. and Educ. Fund, Under the Radar: Muslims Deported, Detained, and Denied on Unsubstantiated Terrorism Allegations 8 (2011), available at http://aaldef.org/UndertheRadar.pdf. 5' See Federal Bureau of Investigation, Protecting America from Terrorist Attack: Our Joint Terrorism Task Forces, fbi.com, available at http://www.fbi.gov/about-uslinvestigate/terrorism/terrorism_jttfs (describing the role and structure ofJTTFs). 5' See Tung Yin, Joint Terrorism Task Forces as a Window into the Security vs. Civil Liberties Debate (2012) 13 FLA. COASTAL L. REV. 1 at 3; Fed. Bureau of Investigation, Boston Joint Terrorism Task Force Memorandum of Understanding (2oo6), available at https://www.aclu.org/files/pdfs/spyfiles/ma_ attachment3_attach_MSP&FBh.pdf. ;; See James Forman, Jr., Community Policing and Youth as Assets (2004) 95 J CR!'v1. L. 6 CRI:v1INOLOCY 1 at 9· For a cogent critique of the use of community policing in the counterterrorism context, see Sahar F. Aziz, Policing Terrorists in the Community (2014) 5 Harvard National Security Joumal 147· 54 See FBI, Protecting America from Terrorist Attack, supra note 51. Sudha N. Setty unconstitutional racial and religious profiling.'' Municipalities such as New York City have engaged in expansive counterterrorism work in the post-9/n years that has raised significant concerns as the infringement of civil liberties.56 Fusion centers are state and local entities meant to enhance the ability of the federal government to garner and synthesize information from local communities,'; but have been criticized for undermining civil liberties and wasting taxpayer funds.''

B. Intelligence Agencies

The Central Intelligence Agency (CIA) and the National Security Agency (NSA), the leading intelligence-gathering organizations for the U.S. government, have operated with much greater latitude in the post-9/n era than previously.59 The CIA has worked extensively to capture, detain, and interrogate suspected terrorists abroad. It operated various secret detention facilities, known as "black sites," throughout the world to accomplish this goal, prompting criticism from international and domestic groups that people were being disappeared by the CIA. 60 In 2009, the use of those black sites was curtailed by President 61 In the post-9/n era, the NSA has, among other programs, allocated tremendous energy and resources to massive data collection of electronic communications of U.S. and foreign persons.6' The NSA defends its collection of telephone call

;; See William Yardley, Portland, Ore, Votes to Reioin Task Force i\fter Terrorism Scare, nytimes.com, April 30, 2011, available at http:!/www.nytimes.comho11/o5/m/us/mportland.html7 _r=2&ref=us& (visited September 27, 2013) (describing the civil liberties concerns behind the temporary refusal of Portland, Oregon, to work with the FBI as part of a JTIF). '' See generally Matt Apuzzo and Adam Goldman, Enemies Within: Inside the NYPD's Secret Spying Unit and Bin Laden's Final Plot Against America (New York, Touchstone, 2013) (offering evidence of systematic religious profiling and discrimination by the New York City Police Department's counterterrorism unit). " See Deparhnent of Homeland Security. State and Major Urban Area Fusion Centers, available at http://www.dhs.gov/state-and-major-urban-area-fusion-centers. ' 8 See Senators Carl Levin and Tom Coburn, Federal Support for and Involvement in State and IDeal Fusion Centers, Permanent Subcommittee on Investigations Committee on Homeland Security and Govemmental Affairs, October 3, 2012. 59 The CIA is prohibited from conducting surveillance within U.S. borders. See Executive Order 12333, 46 Fed. Reg. 59941 (December 4, 1981); National Security Act of 1947. However, the CIA has justified its surveillance within the United States by focusing its efforts on foreign targets that have contact with domestic sources, as well as assigning CIA officers on unpaid leave to work on domestic efforts. See Inspector General David B. Buckley, Review o(CIA.-NYPD Relationship, December 27, 2011, available at https:/ /www.documentcloud.org/docu ments/717864-cia-nvpd-ig.html). See Dafna Linzer and Julie Tate, New I ,ight Shed on CIA's '' Prisons, washpost.com, February 28, 2007, available at http://www.washingtonpost.com/wp-dyn/content/articlehoo7/02h7/ AR2007022702214-hhnl (visited September 27, 2013). 6' Exec. Order No. 13>491, 74 Fed. Reg. 16,4893 (January 22, 2009). 6' Timothv B. Lee, Here's Everything We Know ;\bout PRISM to Date, washpost.com, June 12, 2013, available at http: I /www. washington post. com/bl ogs/wonk bl og/wpho 13/o6/12/h eres-everythi ng-we­ know-about-prism-to-date/ (visited September 27. 2013). The United States 59 metadata and electronic communications based on the FISC's interpretation of section 215 of the PATRIOT Act. The FISC has created a nonpublic body of law that has allowed the NSA to amass the metadata (time, location, duration, and other information not containing content) for all domestic and some international phone calls.6> From June 2013 onward, as details of the breadth and depth of the NSA's surveillance programs continue to leak to the public,64 questions have arisen as to whether the scope of the NSA's surveillance is an unconstitutional intrusion into the privacy of U.S. citizens, whether congressional oversight of the NSA must be strengthened,65 and whether the FISC provides an effective mechanism to curb potential abuse by the NSA. 66 These debates continue to be robust, largely due to the impact of these counterterrorism programs on a vast swath of the U.S. public and because of the seeming inability of the public to understand the program and unwillingness to pressure the political branches to curtail it. This opacity stems from the executive branch secrecy surrounding the program, Congress's inability to disclose the extent of its knowledge to the public or exercise substantial oversight, the FISC not being able to take an adversarial position with regard to government assurances of the necessity of such surveillance, and the extent of NSA access to the data stored by telecommunications companies, even without their consent.67 Thus far, Congress has failed to pass legislation to curtail NSA data collection practices, and reforms to limit the NSA's data collection practices have been modest and have stemmed from the executive branch itself. 68

63 Jennifer Valentino-Devries and Siobhan Gorman, Secret Court's Redefinition of"Relevant" Empowered Vast NSA Data-Gathering, WALL ST. J., July 8, 2013, available at http://online.wsj.com/article/SBwoo J424127ss7323s7390457s57•89375sss3344·htrnl. 14 Fonner CIA contractor Edward Snowden began disclosing numerous aspects of NSA surveillance practices in June 2013. See Glenn Greenwald, NSA Collecting Phone Records of Millions ofVerizon Customers Daily, theguardian.com, June 5, 2013, available at http://www.theguardian.com/worldl2oi3/ jun/o6/nsa-phone-records-verizon-court-order. 63 See Spencer Ackerman, Intelligence Committee Withheld Key File Before Critical NSA Vote, Admid Claims, guardian.com, August 12, 2013, available at http://www.theguardian.com/worldl2oi3/augh2/ intelligence-committee-nsa-vote-justin-amash (noting that congressional leaders had not shared the relevant information with their colleagues prior to voting for PATRIOT Act reauthorization). 66 See Carol D. Leonnig, Court: Ability to Police U.S. Spying Program Is Limited, washingtonpost. com, August 15, 2013, available at http://www.washingtonpost.com/politics/court-ability-to-police­ us-spying-program-li mitedf2013/o8fi 5/¥8c8C44-05Cd-11e3-a07f-49ddq 417125_Story.htrnl (citing U.S. district judge Reggie Walton and noting that "the court lacks the tools to independently verify how often the government's surveillance breaks the court's rules ... [and) it also cannot check the veracity of the government's assertions that the violations its staff members report are unintentional mistakes"). 67 See Nicole Perl roth, Jeff Larson, and Scott Shane, N.S.A. Able to Foil Basic Safeguards of Privacy on Web, N.Y. TIMES, September 6, 2013, at A1 (discussing NSA efforts to make encryption software vulnerable and noting that much of this activity has been sanctioned by the FISC). 68 See Office of the Director of National Intelligence, Signals Intelligence Reform 2015 Annual Report, IC on the Record, available at http://icontherecord.tumblr.com/ppd-28!2015/privacy-civil-liberties (visited February 7, 2015) (detailing some curtailing of the NSA's domestic and foreign data collection 6o Sudha N. Setty

V. PROSCRIPTION/LISTING OF TERRORIST GROUPSfiNDIVIDUALS

A. Proscription Mechanisms

The abilityofthe secretary ofstate to designate "foreign terrorist organizations" (FTOs) as such for the purposes of prohibiting material support, increasing surveillance, and freezing financial assets has been an important tool for U.S. counterterrorism efforts.69 In particular, U.S. law provides that incitement to commit a terrorist act (under circumstances indicating an intention to cause death or serious bodily injury) is a basis for designating a group as either an FT07° or a terrorist organization for immigration purposes.?' Even if a group has not been formally designated as an FTO, if the requisite incitement standard is met, that automatically triggers treatment as a terrorist organization for immigration purposesY Observers suggest that the FTOs fall into one of two categories: those that genuinely threaten the national security of the United States in a direct way, and those that challenge the foreign relations or economic interests of the United States.73 Under the AEDPA, a specific process must be undertaken to designate an organization as an FT0.74 It is a process that is open to critique as being insufficiently rights-protective, but also incorporates some safeguards against abuse.75 Once the State Department has made the FTO designation, limited procedural safeguards are available, after which the designation is finalized.76

and retention practices); Dan Roberts and Dominic Rushe, Proposed Changes to US Data Collection Fall Short of NSA Refonners' Goals, theguardian.com, February 3, 2015, available at http://www .th eguardian. com/us-newshms/fe b/o3/proposed-changes-us-data-coll ection-nsa-reformers (describing changes to NSA data collection practices as modest). 6o U.S. 2oo6 CTC Report, supra note 17, at 8. 7o 8 U.S.C. S u89. 7' 8 U.S. C. S u82(a)(3)(B)(vi)(II) (provided that other relevant legal criteria are met). 7' 8 U.S.C. S u82(a)(3)(B)(vi)(III). 71 Wadie E. Said, The Material Support Prosecution and Foreign Policy (2on) 86 IND. L.J. 543 at s68. 74 See AEDPA SS 219(a)(1)(A)-(C), 219(a)(2)(C) (codified in 8 USC §u89(a)) (finding that anyone who interacts with FTOs is violating the statute, and authorizing the secretary of the treasury to freeze the assets of entities designated as FTOs); Exec. Order No. 12,947, 3 C.F.R. 319 (1995) (establishing authority for the secretary of state and the secretary of the treasury to limit property rights of designated terrorists). See also Exec. Order No. 13,224, 3 C.F.R. 786 (2002) (finding it necessary to utilize financial sanctions against foreign terrorists). 75 See AEDPA S 219(a) (codified as 8 U.S.C. S u89(a)) (establishing both the procedure used for designation as a terrorist organization as well as congressional and judicial means available to pursue designations review and revocation); see also Julie B. Shapiro, The Politicization of the Designation of Foreign Terrorist Organization~: The Effect on Separation of Powers (2oo8), 6 CARDOZO PUB. L. POL'Y 6 ETHICS/. 547 at 556-8 (arguing that the designation process contravenes due process guarantees). 76 Under AEDPA, the secretary of state notifies leaders in Congress and gives notice to designees in the Federal Register. AEDPA S302(a)(2)(A) (codifed as 8 U.S.C. § n89(a)(2)(A)). FTOs then have thirty days to challenge their designation in the U.S. Court of Appeals for the District of Columbia Court. § 302(b ). The United States

Because the consequences of FTO designation can be severe, including the ability of financial intuitions to block or freeze assets of an FTO,n the barring of FTOs from entry into the United States,78 and potential material support charges,79 the procedural safeguards are even more important.80 FTO designation carries with it mandatory review and renewal process for the secretary of state.8'

B. Challenges to Proscriptions and Listings Another such safeguard in the FTO designation process is the opportunity to contest the designation proposed by the State Department. This layer of judicial review protects against arbitrariness in the designation82 and requires some disclosure of the basis upon which the State Department made its determination.83 Designated groups may challenge their designations by seeking judicial review before the D.C. Circuit Court within thirty days of the designation being published in the Federal Register. The court may rely only on the administrative record generated by the secretary of state, who may supplement this record on an ex parte basis with classified information used in making the designation.l4 The D.C. Circuit has the right to reverse if the designation is found to be not in accord with the procedures required by law. The FTO designation remains in force until it is

Such cases, usually based on allegations of an abuse of discretion by the State Department or a lack of substantial support for the FTO designation, are largely unsuccessful. E.g., People's Mojahedin Org. of Iran v. Dep'tofState, 327 F. 3d 1238, 1244 (D.C. Cir. 2003) (upholding FTO designation based on classified evidence and emphasizing deference to the State Department in the FTO designation process). n 18 U.S.C. S2339B (a)(2) (2oo6). 78 8 U.S.C. SS u82(a)(3)(B)(i)(IV)-(V) (2oo6). 79 18 U.S.C. S 2339B(a)(1) (2oo6). The constitutionality of the FTO designation process authorized by Executive Order No. 13,224 and various statutes was upheld by the U.S. Supreme Court in Humanitarian Law Project v. Holder. Holderv. Humanitarian Law Project, 130 S. Ct. 2705 (2010). 8o See Nat'! Council of Resistance of! ran v. Dep't of State, 251 F. 3d 192, 196 (D.C. Cir. 2001) (discussing the severe impact of FTO designation). 8• 8 U.S. C. S u89(a)(4)(C), (a)(6) (2oo6). If no review has been made of an FTO designation for fi ve years, the secretary of state must review the listing to determine whether it should be revoked due to a change in the organization's mission and actions or due to a change in the national security assessment by the United States. See id. 8' Under the AEDPA, courts have the power to set aside the State Department designation of an FTO if it is arbitrary, capricious, and an abuse of discretion or if it is not based on substantial evidence. AEDPA S302(b) (3) (codified as 8 U.S.C. Su89 (c)(3)). Courts have, however, been extremely deferential to the State Department, choosing not to review classified evidence in some instances, but relying instead on State Department affirmations of substantial evidence to support its designation decision. E.g., People's Mojahedin Org. oflran, 327 F. 3d at 1244. 81 E.g., People's Mojahedin Org. of Iran v. United States Dep't of State, 613 F. 3d 220, 231 (D.C. Cir. 2010) (holding that the government had violated due process by failing to give an FTO the opportunity to view unclassified evidence prior to making a final decision denying petition to revoke designation as an FTO). S. See Said, Material Support Prosecution, supra note 73, at 559· Sudha N. Setty revoked by either judicial or administrative review. In either case, the burden lies with the FTO to challenge its designation.

VI. REGULATION OF TERRORISM FINANCING

A. The Regulatory Regime to Counter Terrorism Financing

Executive Order 13224 was signed by President George W. Bush in September 2001 with the stated purpose of disrupting and destroying financial support for al-Qaeda 8 5 A number of policies designed to minimize and disrupt terrorist financing have become important tools in U.S. counterterrorism strategy. These policies are implemented largely by the Treasury Department,86 with support from the State Department and Justice Department. The Office of Intelligence and Analysis (OIA) within Treasury Department was created in 2004, making the Treasury Department the only finance ministry in the world with its own in-house intelligence unit. Separately, Treasury Department's Office of Terrorism and Financial Intelligence (TFI) members chair the U.S. delegation to the Financial Action Task Force, an intergovernmental body that develops and promotes policies to combat illicit finance. 87 Title III of the PATRIOT Act amended the Bank Secrecy Act to require certain financial institutions and businesses to establish anti-money laundering programs. 88 The government also sought to encourage transparency, good corporate governance, and strong anti-money laundering programs through suggesting that public and media attention will cause social stigma to attach to businesses that engage with entities that are associated with criminal or terrorist activity8 9 U.S. authorities have prioritized the investigation and disruption of funding to nonprofit organizations and have used the material support statutes as an effective, if highly controversial, tool to hinder the ability of terrorist groups to maintain their finances. The robust use of material support statutes has caused such solicitation to wither or, in some cases, go further underground.9°

8' Executive Order 13224 of September 23, 2001: Blocking Property and Prohibiting Transactions with Persons Who Commit, Threaten to Commit, or Support Terrorism (citing both domestic authority and United Nations Security Council Resolution (UNSCR) 1214, UNSCR 1267, UNSCR 1333, and UNSCR 1363 as supportive authority). 86 The Treasury Department's Office of Terrorism and Financial Intelligence (TFI) coordinates these efforts. The TFI consists of four subgroups: the Financial Crimes Enforcement Network (FinCEN), the Office of Foreign Assets Control (OFAC), the Office of Terrorist Financing and Financial Crimes (TFFC), and the Office oflntelligence and Analysis (OIA). 87 Third Mutual Evaluation Report on Anti-Money Laundering and Combating the Financing of Terrorism: United States of America (Financial Action Task Force, Paris, France), June 2oo6, at 4 (hereinafter "June 2oo6 Financing Report"), available at http://www.fatf-gafi.org/countries/u-z/ unitedstates/documents/mutualevaluationoftheunitedstates.htrnl. 88 ld. &J ld. at 5· 00 ld. at 8. The United States

The Department of Justice is the principal government entity responsible for overseeing the investigation and prosecution of money laundering and terrorist financing offenses at the federal level, whereas the State Department represents the U.S. government in several multilateral institutions, including those exercising sanctions related to U.N. Security Council Resolution 1267 and Counter-Terrorism Committees.91 The State Department's Office of the Coordinator for Counterterrorism leads its efforts to designate FTOs in order to freeze assets and prepare Executive Order 13224 designations to block assets and prohibit contributions of terrorists and terrorist organizationsY

B. Criminal Offenses ofTerrorism Financing The issues of what standards of knowledge and intent are necessary to sustain a conviction for material support of terrorism have been extensively litigated. The 2010 Supreme Court decision in Holder v. Humanitarian Law Project affirmed the constitutionality of the material support statute, thereby upholding the congressional intent to criminalize almost all support to FTOs, even if the funds were earmarked for humanitarian- not terrorism- purposes.93 The four federal offenses deal directly with financing of terrorism or terrorist organizations and criminalize the provision of material support for the commission of certain offenses,94provision of material support or resources to designated FTOs,95 provision or collection of terrorist funds,96 and the concealment or disguise of either material support to FTOs or funds used or to be used for terrorist acts.97

VII. IMMIGRATION MEASURES

A. Immigration Detention The government is authorized to detain any person for whom it has certified that reasonable grounds exist to believe that the person has engaged in espionage,98 opposition

9' Id. at 17. 9' I d. at 19. 93 Holder v. Humanitarian Law Project, 130 S. Ct. 2705 (2010 ). 94 18 USC 2339A (enacted in 1994 effective in 1996). 9> 18 USC 2339B (enacted by Congress and signed by the president in April1996 and implemented with State Department designations of FTOs on October 8, 1997). o6 18 USC 2339C(a) (enacted June 25, 2002). 97 18 USC 2339C(c) (enacted June 25, 2002). 98 Immigration and Naturalization Act (INA) $237(a)(4)(A)(i) (authorizing detention for those suspected of engaging in espionage, sabotage, or export control). Sudha N. Setty

by violence,99 or terrorist activity' 00 or is involved with an organization that is suspected of terrorist activity.' 0 ' The attorney general may detain the suspect for up to seven days prior to placing the suspect in removal proceedings or charging the suspect criminally.'02 If the suspect is not placed in removal proceedings or criminally charged, the attorney general must release him or her, but if placed in proceedings, the attorney general must detain the person even if he or she is eligible for relief or obtains relief until the attorney general determines that there is no longer any reason to believe that the person falls under one of the bases for certification.' 0 l The attorney general is obligated to review the certification subjecting the person to mandatory detention every six months, and the detainee may request review every six months and may submit documents and other evidence in support of his or her request.'"4 A detainee who has been ordered removed, but whose removal is unlikely in the reasonably foreseeable future, may be detained for additional six-month periods only if the government believes that release will threaten national security or the safety of the community or any person.'0 ' Since September n, 2001, the federal government has relied heavily on immigration law and policy to detain, interrogate, control, and remove suspected terrorists.'06 With fewer checks and balances, it is much easier for the government to arrest, detain, and investigate an individual under immigration law than criminal law. Unlike the U.S. criminal justice system, where defendants have the right to an attorney, the right to a speedy trial, and the presumption of innocence until guilt is proven beyond a reasonable doubt, immigration law does not afford detainees ample protections. For example, a noncitizen is permitted to have an attorney in immigration proceedings, but counsel is not provided for the So percent of detainees in removal proceedings who are indigent. Furthermore, a noncitizen can be mandatorily detained for months, or even years, before being released or

'" INA ~237 (a)(4)(A)(iii) (authorizing detention for those expressing opposition bv violence or overthrow of the U.S. government). INA §212(a)(4)(B) (authorizing detention for those suspected of terrorist activitv); 8 U.S. C. n8z(a) (3)(Bl(i)(lll) and (iv)(l) (authorizing removal of those indicating an intention to cause death or serious bodily harm or who have incited terrorist activity); 8 U.S.C. S !l82(a)(3)(B)(i)(Vl) (making inadmissible aliens who endorse or espouse terrorist activity or persuade others to endorse or espouse terrorist activity). See 8 U.S.C. \. n82(a)(3)(B)(vi)(ll) or (lll). See also U.S. CTC Response 2006, supra note 17, at 8 (noting that "if a group is designated or treated as a terrorist organization for immigration purposes, aliens having certain associations with the group [including persons who knowingly provide material support to the group] become inadmissible to and deportable from the United States"). INA h36(a)(5). INA Hz36(a)(2), (5).

'"4 INA §236A (a)(7). "' INA %236A (a)(6) '"6 ln 2009, Immigration and Customs Enforcement (ICE) had over r.6 million aliens in its scope of monitoring: in ICE detention centers, in other jails or prisons, or under a released monitoring system. See Department of Homeland Security Office of the Inspector General, Supervi.

'' 7 Immigration and Naturalization Act ~24o(c)(3)(A). '' See J\shcroft v. Iqbal, 556 U.S 662, 667-9 (2009). Another category of detained aliens are those subject to an additional interagency screening called Third Agency Check. This system screens aliens in ICE custody who are from specially designated countries (SDCs) that have "shown a tendency to promote, produce, or protect terrorist organizations or their members." See DHS 2ou IG Report, supra note 105, at 5· The SDC list is largely comprised of majority Muslim nations. See ICE I ,ist of Specially Designated Countries (SDCs) that Promote or Protect Terrorism, publicintelligence.net, July 2, 2011, available at http://publicintelligence.net/ specially-designated-countries/ (listing the SDCs that were originally part of the DHS 2011 IG Report, hut which were subsequently removed from that publication). "'' See Ctr. for Human Rights and Global Justice, Asian Am. Legal Def. and Educ. Fund, UNDER THE RADAR: MUSLIMS DEPORTED, DETAINED, AND DENIED ON UNSUBSTANTIATED TERRORISM ALLEGATIONS 4 (2011) (hereinafter "Under the Radar"), available at http://aaldef.org/UndertheRadar .pdf (discussing various programs targeting noncitizens, including Absconder Apprehension Initiative, NSEERS special registration policy, and Operation Frontline). Another controversial immigration policing program is Secure Communities, which requires state and local police to send fingerprints of arrestees to ICE so that undocumented immigrants can be identified and possibly detained, prosecuted and removed. See Immigration and Customs Enforcement, Secure Communities, ice.gov (describing the Secure Communities program), available at http://www.ice.gov/secure_communities/ (visited September 13, 2013). '" See "Under the Radar," supra note no, at 4· See, e.g., Attorney General John Ashcroft and INS Commissioner Jim Ziglar, Announcement of INS Restructuring Plan (November 14, 2001), available at http://www. justice.gov/archive/ag/speecheshom/ agcrisisremarksn_14.htm ("The INS will also be an important part of our effort to prevent aliens who engage in or support terrorist activity from entering our country."). " 1 See DHS 2011 IG Report, supra note 106, at 1 (noting that immigration authorities had generally complied with applicable domestic laws). '" See "Under the Radar," supra note no, at 18 (citing the conclusion of the U.N. Special Rapporteur on the Rights of Migrants that U.S. immigration enforcement policies violate international laws that bar arbitrary detention). 66 Sudha N. Setty

VIII. ADMINISTRATIVE/EXECUTIVE MEASURES

The AUMF and PATRIOT Act cemented the government's authority to determine whether information was too sensitive to disclose and then punish those who disclosed such information.n; More recently, Congress enacted the National Defense Authorization Act of 2012, which empowered the president to take extraordinary national security measures unilaterally and enabled further nondisclosure of information by the administration and rnilitary.n6 One area in which the tensions between secret, unilateral executive action and the desire for a public, multibranch course of action has been most prominei ' is that of targeted killings. The U.S. use of unmanned aerial vehicles ("drones") for targeted killings"/ of suspected terrorists has expanded significantly since President Obama took office in 2009.ns The Obama administration has consistently emphasized the necessity, efficacy, and legality of targeted killings. However, the program has prompted much debate over its existence,n9 the moral calculus'20 and legal parameters and authorities for such a program,l2l and specific questions

"' See USA PATRIOT Act of 2001, Pub. L. No. 107-56, S215, n5 Stat. 272 (codified in scattered sections of 50 U.S. C.) (disallowing the dissemination of information regarding any business records that are sought pursuant to terrorism investigations); id. § 223 (codified in scattered sections of 18 U.S.C.) (permitting civil liability and administrative disciplinary measures against individuals who make unauthorized disclosures of information); id. )n6 (prohibiting disclosure to individuals involved in suspicious activities that such activity was reported pursuant to the issuance of a National Security Letter). " 6 National Defense Authorization Act for Fiscal Year 2012, Pub. L. No. 112-81, §1025 (2on) (limiting the types of information, forms of communication, and representation available to detainees). Although "targeted killings" are not defined under international law, they are often considered to encompass "premeditated acts of lethal force employed by states in times of peace or during armed conflict to eliminate specific individuals outside their custody." See Jonathan Masters, Targeted Killings, Council on Foreign Relations, May 23, 2013, available at http://www.cfr.org/counterterrorism/ targeted-killings/p9627 (visited July 18, 2013). Although the govemments that utilize targeted killings differentiate them from assassinations (see Harold Hongju Koh, The Obama Administration and lntemational Law, March 25, 2010, available at http://www.state.gov/s!llreleases/remarks/r39"9 .htm), critics view them as similar actions in terms of illegality. See, e.g., Complaint, Al-Aulaqi, et al. v. Panetta, at ~1, Case 1:12-cv-01192-RMC (D.D.C. July 18, 2012). "' See New America Foundation, Drone Database, available at http://natsec.newamerica.net/about (visited July 18, 2013) (detailing the number of drone strikes by the United States in and Pakistan since 2004). '"' See, e.g., Philip Alston, Report of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions: Study on Targeted Killings, A/HRC/r4/24'Add.6, May 28, 2010 (questioning the legality of the CIA drone program). See generally Samuel lsaacharoff and Richard H. Pildes, Drones and the Dilemma ofModem Warfare, available at http://ssrn.com/abstract=2268596 (visited July 31, 2013) (theorizing the moral dilemma of drone use in the context of warfare in which geographic and other traditional boundaries of violence are distorted). "' See Alston, supra note 119, at Add.6, May 28, 2010 (discussing international law of war principles with regard to targeted killings); e.g., Eric Holder, Attomey General Eric Holder Speaks at Northwestem The United States regarding the legality of its scope in terms of geographic location of the target and citizenship of the target.'22 The parameters and future of the targeted killings program should be considered in the context of two Obama administration positions as to the nature of the battle being fought: first, the assertion that the theater of war for U.S. counterterrorism efforts is not restricted geographically and, therefore, encompasses the entire globe;' 2 ' and second, statements made by administration officials in early 2013 that although the country should not remain on a war footing permanently, current counterterrorism efforts will likely last another ten to twenty years.'"'~ The parameters of the targeted killing program remain largely shielded from public view, with limited information disclosed during President Obama's first term'2 5 and the leak of a classified Department of Justice memorandum detailing some of the legal bases for the program. 126 In early 2012, Attorney General Holder's public statement on drone use made clear that the administration was not bound geographically, that U.S. citizenship was no protection against being included on the list of targets for a drone strike, and that no judicial process was constitutionally necessary to target U.S. citizens so long as the administration followed its own careful procedures of determining whether to target a citizen.'27 In May 2013, President Obama gave his second'28 major national security policy speech, discussing a number of national security and foreign policy priorities, but

University School of Law, March 5, 2012, available at http://www. justice.gov/iso/opa/ag/speechesho12/ ag-speech-120305Lhtml (outlining the parameters used by the Obama administration to determine whether a targeted killing comports with international and domestic legal obligations). See Al-Aulaqi v. Obama, 727 F. Supp. zd 1 (D.D.C. 2010) (dismissing, based on standing grounds, the suit of Nasser al-Aulaqi to enjoin the U.S. government from keeping his son, U.S. citizen Anwar al-Aulaqi, on its targeted killing list). "' Spencer Ackerman, Spec Ops Chief Sees 'w to zo Years' More for War Against ai-Qaida, wired.com, May 16, 2013, available at http://www.wired.com/dangerroomho13/o5/decacles-of-war/ (visited july 18, 2013) (discussing the Senate testimony of Michael Sheehan. the assistant secretary of defense for special operations and low-intensity conflict, with regard to the global theater of war). "-4 I d. (relating the Senate testimony of Michael Sheehan, the assistant secretary of defense for special operations and low-intensity conflict, with regard to the probable duration of the U.S. counterterrorism effort against al-Qaida). "5 E.g., John 0. Brennan, Remarh of John 0. Brennan: Strengthening Otlr Security by i\dhering to Our Vallles and Laws, September 16, 2011, available at http://www. whitehouse. gov /the-press-officehon/o91J6/ remarks-john-a-brennan-strengthening-our-security-adhering-our-values-an (visited July 24, 2013): Koh, The Obama Administration and lntemationall ,aw, supra note 117 " 6 Department of Justice White Paper, Lawfulness of a Lethal Operation Directed i\gainst a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa'ida or an Associated Force, available at http:// msnbcmedia.msn.com/i/msnbc/sections/news/o20413_DOJ_White_Paper.pdf (visited juh· 24, 2013) (hereinafter "DOJ White Paper").

" 7 See Holder, Attorney General Eric Holder Speaks, supra note 121. "' President Obama gave his first major speech on national securitY in 2009. See Remarks by the President on National Security, May 21,2009, available at http://www.whitehouse.gov/the-press-office/ remarks-president-national-security-5-21-09 (hereinafter "2009 National ArchiYes Speech"). 68 Sudha N. Setty focusing in large part on the parameters of the administration's targeted killing program. 129 In it, he argued that the use of drones to kill suspected terrorists is effective, legal and necessary, yet also acknowledged legal, foreign policy and political constraints on the program.'3° Some critics were disappointed that the speech did not place additional meaningful limits on the president's authority to use drones, and that the president's promises of transparency and adequate oversight were unsupported by specific details or plans.'l'

IX. ROLE OF MILITARY AND EXTRATERRITORIAL COUNTERTERRORISM ACTIVITIES

A Military Courts and Detention

The Bush administration decided immediately after the September 11 attacks to detain suspected terrorists as unlawful enemy combatants- often at the U.S. military facility in Guantanamo Bay, - and to try them, if at all, before a military commission.'l2 Such detention would not necessarily comport with international standards, and any commissions would be administered by the executive branch and would not necessarily include the protections mandated by the Uniform Code of Military Justice for the courts-martial system.'33

"9 Remarks by the President at the National Defense University, May 23, 2013, available at http://www .whitehouse. gov /th e-press-offi ceho 13/o 512 3/rema rks-presi dent-na ti onal-d efense-u ni versi ty (hereinafter "May 2013 NDU Speech").

130 Id. 'l' E.g., Glenn Greenwald, Obama's Speech: Seeing What You Want to See, theguardian.com, May 27, 2013, available at Fred Kaplan, Obama's Post-gin World, slate. com, May 23, 2013, available at http:// www. theguardian.com/commentisfree/2013/may/27 /obama-war-on-terror-speech (visited August 12, 2013) (arguing that President Obama's speech was mostly rhetoric meant to appease critics from a variety of political perspectives); http://www.slate.com/articles/news_and_politics/war_stories/2013/o5/ barack_obama_national_defense_university_speech_nothing_new _about_drones.htrnl (visited July 18, 2013) (noting that President Obama's speech outlined limits that were almost identical to those already in place and that the Justice Department had defined those limitations in ways that rendered the restrictions "meaningless"). Some politically conservative critics asserted that President Obama's speech consisted largely of rhetoric to appease liberal voters concerned about the administration's use of drones, but that Obama's substantive policy and approach to executive power was similar to that of President George W. Bush. See, e.g., , The President's Speech: A Quick and Dirty Reaction- Part 1 (Are We At War?), Blog, May 23, 2013, available at http://www.lawfareblog .comh013/o5/the-presidents-speech-a-quick-and-dirty-reaction-part-1/. 'l' Military Order of November 13, 2001, 66 Fed. Reg. 57833 (November 13, 2001). '" See Setty, Specialized Trials, supra note 31, at 142-3 (discussing the ways in which the procedural protections offered to detainees in the military commission system deviated from the Uniform Code of Military Justice). The United States

a. Detention at the Guantanamo Bay Facility

In designating the Guantanamo Bay, Cuba, military facility'W to hold detainees, the Bush administration made an overt choice to seek to evade the domestic legal protections that would run to detainees held on U.S. soil,'35 including access to hearings.'J6 The government further denied the applicability of international human rights and humanitarian norms and international law more generally, as applied to the detainees held at Guantanamo.'J7 When the Supreme Court held that the U.S. habeas corpus statute encompassed the indefinite detention of detainees at Guantanamo,'J8 the administration convinced Congress to amend that statute to deny all detainees the right to habeas corpus, even those who had already filed claims in court.'39 In the 2oo8 Boumediene v. Bush decision, the Supreme Court ruled that Congress and the president could not decide that detainees at Guantanamo had no access to the law. '4° Since then, most captured detainees have been taken to other locations, such as the Bagram Air Force base in , where courts have held that detainees have no habeas rights. '4' Since 2002, 779 men have been taken to the naval base in Guantanamo Bay, Cuba,'+' and 164 remained there as of September 2013.'43 There have been consistent reports of widespread abuse, torture, and violations of the prisoners' human rights. '44

'34 For a thoughtful and detailed assessment of the role of the Guantanamo Bay military facility in U.S. history and foreign policy, see Ernesto Hernandez-Lopez, Guantdnamo as Outside and Inside the U.S.: Why Is a Base a Legal Anomaly? (2010) 18 A'-'1. ll. /GENDER SOC. POL"Y 6 L. 471. ' 35 See Rasul v. Bush, 542 U.S. 466, 497-8 (2004) (Scalia,]., dissenting). '36 David Cole, The Taint of Torture: the Roles of Law and Policy in Our Descent to the Dark Side (2012) 49 HOUS. L REV. 53, 65. '37 See Memorandum from Jack L Goldsmith lll, Assistant Attorney Gen., Office of Legal Counsel, to Alberto R Gonzales, Counsel to the President, "Protected Person" Status in Occupied Iraq Under the Fourth Geneva Convention 23 (March 18, 2004), available at http://www. justice.gov/olc/zoo4/ gc4man8.pdf. '38 See Rasul v. Bush, 542 U.S. 466, 484 (2004). ' 39 See Military Commissions Act of 2oo6, Pub. L. No. 109-366, S7, 120 Stat. z6oo, 2635-36 (codified as amended at 28 U.S. C. S2241(e) (1) (zoo6)). '40 See Boumediene v. Bush, 533 U.S. 723, 785 (zooS). ("The Constitution grants Congress and the President the power to acquire, dispose of, and govern territory, not the power to decide when and where its terms apply.") '4' See Al-Maqaleh v. Gates, 605 F. 3d 84 (D.C. Cir. 2010). '4' Amnesty lnt'l, USA: "I Am Fallen into Darkness." , Guantdnamo Detainee in His 12th Year Without Trial I (2013), available at http://www.amnestyusa.org/sites/default/files/amr510512013en.pdf. '43 See Karen McVeigh, US Sends Two Guantdnamo Bay prison Detainees Home to Algeria, theguardian.com, August 29, 2013, available at http://www.theguardian.com/worldhoq/aug/z9/ us-guantanamo-bay-detainees-algeria (visited September 22, 2013) (detailing the recent release of two Algerian detainees, bringing the total number of Guantanamo detainees to 164). '44 See, e.g., Ctr. for Constitutional Rights, Report on Torture and Cruel, Inhumane, and Degrading Treatment of Prisoners at Guantdnamo Bay, Cuba (zoo6), available at http://ccrjustice.org/files/ Report_ReportOn Torhne. pdf. ]0 Sudha N. Setty

Almost two-thirds of the prisoners joined an ongoing hunger strike in February 2013, which has led to military resorting to force-feeding several prisoners. 1-+5 Federal district courts have declined to intervene on behalf of the prisoners, despite widespread condemnation by the United Nations and international human rights groups that the force-feeding constitutes torture. 1-+6 President Barack Obama recommitted to closing Guantanamo Bay in May 201347 after failing to fulfill the promise to do so when he took office in 2009.148

b. Access to Justice

The United States Supreme Court, in a series of cases from 2004 to zoo8/-+9 found various aspects of the administration's detention and military commission model to be unconstitutional. However, the Supreme Court consistently found that the use of military commissions instead of the ordinary criminal justice system was constitutionally acceptable. 1' 0 Supreme Court jurisprudence set a minimum guarantee of constitutional rights to be available to detainees, such as that of habeas corpus, but curtailing certain procedural and substantive protections in a military commission system is acceptable. 1' 1 After initially suggesting that military commissions were not necessary

'" Ann E. Marimow, Judge Rejects Request to Block Force-feeding of Cuantanamo Bay Detainees, WASH. POST (July 16, 2013), http://articles.washingtonpost.comhoq-o7-16/ national/4o6o6715_1_hunger-strike-detainees-force-feeding. '46 See United Nations Human Rights, IACIIR, UN Working Croup 011 Arbitrary Detention, (If'\ Rapporteur on Torture, UN Rapporteur on /Iuman Rights and Counter-Terrori.sm. and UN Rapporteur on 1/ea/th Reiterate Need to End the Indefinite Detention of Individuals at Cuatdnamo Naval Base in I ,ight ofCurrent I Iuman Rights Crisis, May 1, 2013, available at http://www.ohchr.org/EN/NewsEvents/ Pages/DisplayNews.aspx?NewsiD=1)278&LangiD=E (decrving the force-feeding of the detainees as contrary to international law). 'r See President Barack Obama. Remarks by the President at the .National Defense University (Mav 23, 2013), available at http://www.whitehouse.gov/the-press-officeho13/o5i23/remarks-president­ national-defense-university. "' See President Barack Obama. Closure Of Cuantanamo Detention Facilities (January 22, 2009). available at http://www.whitehouse.gov/the_press_office/ClosureOfGuantanamoDetentionFacilities . (visited September 22, 2013). '"" See Roumediene v. Bush, 553 U.S. 723 (2oo8) (demanding improved procedural protections for detainees to comport with constitutional due process requirements); liamdan v. Rumsfeld, 548 U.S. 557 (2oo6) (demanding congressional authorization for military commissions); 1-/amdi v. Rumsfeld, 542 U.S. 507, 538 (2004) (finding the lack of due process protections in the military commission svstem to be unconstitutional). ''' See l-lamdi v. Rumsfeld, 542 U.S. 507, 538 (2004) (acknowledging "the possibility that the [due process] standards [the Supreme Court] ha[s] articulated could be met by an appropriately authorized and properly constituted military tribunal""); see also Boumediene v. Bush, 553 U.S. 723 !2oo8) !same). See 1/amdi. 542 U.S. at 538. The United States 71

to try detainees, President Obama in 2009 revived the military commission system/'2 citing the long history of their use and military necessity.•s1 A July 2009 protocol noted that detainees are entitled to the presumption of trial in an ordinary criminal court, but numerous objective and subjective factors could warrant a change in venue, including strength of interest, efficiency, and "other prosecution considerations'' such as the available sentence and the ability to use certain evidence m a g1ven forum.'54 Under the Military Commissions Act of 2009, evidence from torture or cruel, inhuman, or degrading interrogations is disallowed, the use of hearsay is limited, defendants are granted greater latitude in selecting their counsel, and protections against self-incrimination were instituted.'" Nonetheless, significant deviations exist among the military commissions, the courts-martial system, and ordinary criminal courts. Defendants in military commissions are guaranteed neither the right to remain silent or the right to the exclusion of their previous coerced statements,'56 nor the right to a speedy trial.''" Trial for ex post facto crimes is permissible in a military commission.'58 Guilty verdicts in noncapital cases can be rendered by two-thirds of the jury. '59 Hearsay evidence is more easily admissible, and access to classified information is significantly curtailed.'60 The controversial and problematic curtailing of these clue process protections is further compounded by the Obama administration's reservation of the right to continue to imprison anyone acquitted

''' See David E. Sanger, Ohama After Bush: l ,eading by Second Thought, 'i Y TI\H:s, May 1), 2009, at A3 (discussing President Obama's changing stance on the utility of military commissions) . ., Press Release, the White House, Office of the Press Secretary, Statement of President Barack Obama on Military Commissions (May 15, 2009), http://www.whitehouse.gov/the_press_office/Statement­ of-President-Barack-Obama-on-Military-Commissions/ (last visited October 21, 2010 ). ' 54 See Department of Defense and Department of Justice Protocol, Determination of Guantanamo Cases Referred for Prosecution, at 2 (july 20, 2009) . .,, See Jennifer K. Elsea, Comparison of Rights in r'vlilitary Commission Trials and Trials in Federal Criminal Court, Congressional Research Service, Februarv 28, 2013, available at http://www.fas.org/ sgp/crs/natseclfuto932.pdf (offering a detailed comparison of the rights guaranteed under the Military Commissions Act of 2009 and those offered in ordinary criminal courts). ''6 Compare Military Commissions Act ~ 949a(b)(2)(c) with Unif. Code of Military justice, art. 31, \,) (a), (b), & (d) (guaranteeing freedom from self-incrimination, and which are specifically made inapplicable to military commissions) and U.S. Const., amend. V (guaranteeing freedom from self-incrimination). '" Military Commissions Act S 949a. A speedy trial is guaranteed in both Article lil courts and courts martial. U.S. Const., amend. VI (giving the right to a speedy trial); 18 U.S.C. S 3161(d)(2) (zooS) (mandating commencement of trials within seventy davs of indictment or original appearance in court). Unif. Code of Military justice, art. 10. '' Military Commissions Act S. S 948d, 95op. Cf. U.S. Cons!., art. 1, S 9, cl. 3 ("No ex post facto law shall be passed."). ''" Militarv Commissions Act ) 949m. Cf Fed. R. Crim. P. 31 (requiring unanimous jury verdicts for conviction). ''' Militarv Commissions Act ~ ~ 949a(b )( 3)(D), 949P+ 949P-7 Sudha N. Setty under the military commission system if security interests suggest that continued detention is necessary.' 61 A number of military commission trials have taken place at the Guantanamo Bay detention facility,' 62 despite critiques that the trials are both unnecessary given the availability of ordinary criminal courts and the courts-martial system and fundamentally unfair, and despite irregularities and setbacks. For example, was first detained in 2002 at the age of fifteen, subjected to problematic interrogation, and eventually pled guilty to various terrorism-related charges.'63 , a driver to , was convicted of conspiracy in a military commission, a charge that was overturned by an appellate court in 2012 based on the fact that conspiracy was not considered a war crime at the time that Hamdan was detained.'64

c. Torture and Accountability

The United States has long been party to international treaties prohibiting torture as well as cruel, degrading, and inhuman treahnent. Among them are the Universal

Declaration of Human Rights/65 the ,'66 the International Covenant on Civil and Political Rights,'67 the American Convention on Human Rights,' 6 ~ and the Convention Against Torture.'69 On the domestic level, the Fifth, Eighth, and Fourteenth Amendments to the U.S. Constitution have been interpreted as prohibiting torture,'7° and various domestic laws codify the obligations

'6' Jess Bravin, Detainees, Even If Acquitted, Might Not Go Free, WALL ST. 1 (July 8, 2009), http://online .wsj.com/article/SB12469968o303307309.html (last visited September 21, 2013). '6' See Military Commissions Cases, Office of Military Commissions, available at http://www.mc.mil/ CASES/MilitaryCommissions.aspx (visited September 21, 2013). '6' See Charlie Savage, Deal Averts Trial in Disputed Guantanamo Case, nytimes.com, October 25, 2010, available at http://www.nytimes.comho10/10h6/usi26gitmo.html (visited September 21, 2013). ' 64 See 1-!amdan v. United States, 696 F. 3d 1238 (D.C. Cir 2012). '65 Universal Declaration of Human Rights, G.A. Res. 217A (lll), U.N. Doc A/810, at 71 (December 10, 1948). '66 Geneva Convention Relative to the Treab11ent of Prisoners of War, August 12, 1949, 6 U.S.T. 3316, 75 U.N.T.S. 135 (entered into force October 21, 1950); Geneva Convention Relative to the Protection of Civilian Persons in Time of War, August 12, 1949, 6 U.S.T. 3516, 75 U.N.T.S. 287 (entered into force October 21, 1950 ). '67 International Covenant on Civil and Political Rights, December 16, 1966, 999 U.N.T.S. 171 (entered into force March 23, 1976). '68 American Convention on Human Rights, O.A.S. Treaty Series No. 36,1144 U.N.T.S.123 (entered into force July 18, 1978), reprinted in Basic Documents Pertaining to Human Rights in the Inter-American System, OEA/SerL.V/Il.82 doc. 6 rev.! at 25 (1992). '"" Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, December 10, 1984, 1465 U.N.T.S. 85 (entered into force June 26, 1987) (hereinafter "Convention Against Torture"). See generallv Seth F. Kreimer, 'Ibo Close to the Rack and the Screw: Constitutional Constraints on Torture in the War on Terror (2003) 6 u Pi\ 1 CO,"iST L 278. The United States 73 in the Convention Against Torture: the federal Torture Statute,''' the Torture Victim Protection Act of 1991/72 the Alien Tort Claims Act,'7l and the Foreign Affairs Reform and Restructuring Act of 1998.'74 In late 2003, evidence surfaced of abuse and torture of detainees held at the Abu Ghraib prison in Iraq at the hands of members of the U.S. military.'75 Similar reports surfaced from the detention facility at Guantanamo Bay.''6 Memos prepared by the Office of Legal Counsel in 2002 and 2003 advised the president and the military that detainees who were suspected members of al Qaeda were not protected by international and domestic prohibitions against torture and, furthermore, that abuse of detainees would not constitute "torture" unless the interrogators intended to cause the type of pain associated with death or organ failme.'77 Those memos were subsequently rescinded, and several members of the military were convicted at courts-martial for detainee abuse.''~ Congress subsequently cemented the U.S. prohibition of the abuse and torture of detainees with the of 2005.'79 In 2009, President Obama signed an executive order banning the use of enhanced interrogation techniques and limiting interrogation techniques to those permitted in the Am1y Field Manual.'80 Such limitations were reinforced with the Military Commissions Act of 2009.' 8' Despite Obama's campaign rhetoric on the need for a full accounting of torture, President Obama has not pursued prosecution and

'7' Foreign Relations Authorization Act, Fiscal Years 1994 and 1995, Pub. L. No. 103-236, ). 506, 108 Stat. 382 (codified at18 U.S.C. §§ 2340-2340B (2oo6)). ' 7' Torhue Victim Protection Act of 1991, Pub. L. No. 102-256, 106 Stat. 73 (codified at 28 U.S. C. S 1350 note (2oo6)). '"1 Alien Tort Claims Act, 28 U.S. C. S 1350 (2oo6). ' 74 Foreign Affairs Reform and Restruchuing Act of 1998, Pub. L. No. 105-277, 2242(a), m Stat. 2681 (codified at8 U.S.C. S1231 (2oo6)). '" Seymour M. Hersh, Torture at Abu Chraib, THE NEW YORKER (May 10, 2004) available at www .newyorker.com/archivel2oo~o5ho/o4051ofa_fact. '76 See, e.g., Center for Constih1tional Rights, Report on 'l(>rture and Cruel, Inhumane, and Degrading Treatment of Prisoners at Guantdnamo Bay, Cuba (zoo6) available at http://ccrjustice.org/files/ Report_ReportOnTorture.pdf. '~ 7 Memorandum for Alberto R. Gonzales, Counsel to the President, from JayS. Bybee,Asst. Atty. General, Standards of Conduct for Interrogation Under 18 U.S. C. \ S2340~2340A (Aug. 1, 2002); Memorandum from Jay S. Bybee, Asst. Atty. General, regarding Standards of Conduct for Interrogation Under 18 U.S. C. ~ § 2340-2340A (August 1, 2002). ,,q Scott Shane, David Johnston, and James Risen, Secret US Endorsement of Severe Interrogation, N.Y. TIMES, October 4, 2007, available at http://www.nvtimes.coml2oo7/w/o~washington/o4interrogate .html?pagewanted=all. ' 79 Detainee Treatment Act of 2005, Pub. L. No. !O

d. Non-refoulement

The non-refoulement obligation in Article 3 of the Convention Against Torture'83 applies to U.S. extraordinary rendition practices and the movement of detainees from the Guantanamo detention facility. With regard to the former, when Canadian-Syrian dual citizen Maher Arar was rendered to Syria, the United States was obligated to seek assurances that he would not be mistreated there. However, evidence suggests that Arar was subjected to prolonged abuse and torture by his captors in Syria.'84 With regard to Guantanamo, several detainees have been cleared for release, but under the obligation of non-refoulement, the United States continues to hold them because of fear of torture upon return to their countries of citizenship.'8>

B. Extraterritorial Terrorism Law Enforcement

Since the attacks of September n, extraordinary rendition has been used to capture over one hundred suspected terrorists in foreign countries and remove them to other nations for interrogation and control purposes. Some such detainees suffered extreme abuse and torture at the hands of their interrogators.'86 Several have brought suits in U.S. courts seeking compensation for their treatment. Despite substantial evidence that citizens of Canada/87 Germany/88 and the United Kingdom/89 among others, were rendered by the United States government to other nations and were

'8' Scott Shane, No Charges Filed on Harsh Tactics Used by the C.I.A, nytimes.com, August 30, 2012, available at http://www.nytimes.comho12/o8/31/us!holder-rules-out-prosecutions-in-cia-interrogations .html?pagewanted=all (visited September 27, 2013). '8l Convention Against Torture, supra note 168, Art. 3· '84 See Human Rights Watch, Torture and Non-refoulement, January 29, 2004, available at http://www .hrw.org/news/zooflo1128/torture-and-non-refoulement (detailing Arar's situation). •8s International Committee of the Red Cross, Persons Detained by the US in Relation to Armed Conflict and Counter-terrorism - the Role of the ICRC, June 18, 2013, available at http://www.icrc.org/eng/ resources/documents/misc/united-states-detention.htm. •86 See Amrit Singh, Globalizing Torture: CIA Secret Detention and Extraordinary Rendition (2013), Open Society Foundations, at 13-15 (describing the history and use of extraordinary rendition). '87 See Commission of Inquiry into the Actions of Canadian Officials in Relation to Maher Arar, Report of the Events Relating to Maher Arar: Analysis and Recommendations (zoo6). See also Kent Roach, Review and Oversight of National Security Activities and Some Reflections on Canada's Arar Inquiry, 29 CARDOZO L. REV. 53 (2oo8). '88 See Jane Mayer, The Dark Side 282-87 (New York, Anchor, 2oo8) (detailing Khalid El-Masri's plight). •&J See Sudha Setty, Judicial Formalism and the State Secrets Privilege (2012) 38 WM. MITCHELL L. REV. 1630 at 1634-5 (detailing the claims ofBinyam Mohamed). The United States 75 subsequently abused by the security forces in the nations to which they were rendered, all such suits have been dismissed on procedural bases.'9° In 2009, the Obama administration created a task force to study the practice of extraordinary rendition with the aim of ensuring compliance with domestic and international human rights standards and legal norms.'9' Renditions are believed to be continuing under this articulated standard.'92

X. SECRECY AND TERRORISM

A. Secrecy Claims and Secret Evidence

The Classified Information Procedures Act (CIPA) is a 1980 law that established procedures for the use of classified and secret information in criminal trials.'9l CIPA outlines a comprehensive set of procedures for the treatment of evidence in criminal cases that implicate classified information or rely on evidence that is classified. For example, CIPA allows the government, under limited circumstances, to substitute unclassified summaries of classified evidence.'94 The Supreme Court in Boumediene v. Bush acknowledged the need to deal with classified information in a sensitive and thoughtful manner and expressed confidence that ordinary criminal courts would be able to manage the task successfully.'95

B. Secrecy in the Courtroom and Anonymous Witnesses

The state secrets privilege is a common law evidentiary privilege that enables the government to prevent disclosure of sensitive state secrets in the course of litigation. The claim of privilege by the government, if upheld by a court, can result in consequences ranging from the denial of a discovery request for a particular document to the outright dismissal of a suit. Although a balancing test for assessing claims of privilege was established in the 195os,'96 a meaningful assessment has

' 90 E.g., Mohamed v. Jeppesen Dataplan, Inc., 614 F. 3d 1070, 1092-93 (9th Cir. 2010) (en bane); Arar v. Ashcroft, 585 F. 3d 559, 565 (zd Cir. 2009), cert. denied, 130 S. Ct. 3409 (2010); EI-Masri v. United States, 437 F. Supp. 2d 530 (E.D. Va. 2006), aff'd, 479 F. 3d 296 (4th Cir. 2007), cert. denied, 128 S. Ct. 373 (2007). ' 9' See Executive Order 13,491, Ensuring Lawful Interrogations at§ (5)(e)(ii) (January 22, 2009). '9' See David Johnston, U.S. Says Rendition to Continue, but with More Oversight, nytimes.com, August 24, 2009, available at http://www.nytimes.comhoo9/o8h5/us/politicsh5rendition.html?_r=o (visited September 22, 2013).

'93 Classified Information Procedures Act of 1980, Pub. L. No. 96-456,94 Stat 2025. '94 Classified Information Procedures Act of 1980, Pub. L. No. 96-456,94 Stat 2025, S 6. '95 Boumediene v. Bush, 553 U.S. 723, 128 S. Ct. 2229, 2276 (zooS). '96 United States v. Reynolds, 345 U.S. 1 (1953). Sudha N. Setty often been precluded by the judicial tendency to uphold claims of privilege without engaging in a substantial analysis of the underlying evidence or of the government's claimed need for nondisclosure.'97 In 2009, the Obama administration promised to reform the use of the state secrets privilege to allow for greater govermnent accountability.'9~ However, the administration's continued aggressive use of the privilege, seeking and winning dismissal of suits alleging serious government abuse such as torture,'99 suggests only continuity in the use of the privilege to prevent meaningful accountability through civil suits.

XI. CONCLUSION

U.S. counterterrorism policy has shifted in some significant ways, such as ending the use of abusive interrogation practices and accepting that international law applies to U.S. counterterrorism practices. However, the continuity between the Bush and Obama administrations in the substance of many counterterrorism programs, the assertion of high levels of presidential power, and the continued high level of secrecy have created a bipartisan imprimatur of the robust counterterrorism programs that exist today, as well as the many problematic aspects of those programs. Congress, the judiciary, and the public, all grateful that no large-scale terrorist attacks have occurred since 2001 and cognizant that threats still exist, have been largely acquiescent despite significant costs to human rights and civil liberties in the form of racial and religious profiling, indefinite detention, expansive and seemingly poorly controlled surveillance, extrajudicial killings, torture, and other abuses for which there has been a pronounced lack of accountability. The government's aggressive counterterrorism stance has influenced actions and policies outside of the U.S. federal government: the work of domestic local and state-level law enforcement has been altered through federal programs mandating vertical information sharing and coordination; the United States has exerted significant influence on the United Nations Security Council in shaping and promoting resolutions that have had a worldwide impact on counterterrorism programs; and the United States has exerted its soft power to attempt to influence other nations to shape their own counterterrorism policies m ways that promote

"'" See Setty, Judicial Fomwlism, supra note 189. "'' See Memorandum from Eric Holder, Attorney Gen., on Policies and Procedures Governing Invocation of the State Secrets Privilege to Heads of Exec. Dep'ts & Agencies (September 23, 2009), available at http: I llegaltimes. typepad. com/files/ag-memo,re,state,secrets,dated-o9-22-o9. pdf (establishing lavers of internal review within the Department of justice and including a new executive branch policy to report to Congress any invocations of the state secrets privilege). "" See Mohamed v.feppesen Data plan, 614 F. 3d 1070 (9th Cir. 2010) (en bane) (dismissing a suit seeking compensation for extraordinary rendition and torhne based on the government's invocation of the state secrets privilege). The United States 77

U.S. interests. 20° Furthermore, the U.S. stance on issues such as foreign surveillance and the use of drones for targeted killings in areas that are not active theaters of war has set a dangerous precedent with regard to other nations attempting to develop and use the same technology. 201 It may be that the muscular stance of the United States on such issues will promote a similar response in other nations as their technology and power develops. Future challenges for U.S. counterterrorism law are manifold. The driving imperative will continue to be recognizing and confronting continuing threats posed by al-Qaeda, other foreign terrorist groups, domestic terrorism, and cyberterrorism. However, the United States would do well to improve its transparency and accountability mechanisms to comport with the rule oflaw and maintain democratic values. Such initiatives are unlikely to stem from the executive branch, which means that the judiciary, Congress, and public must engage more fully to insist upon open debate, accountability, and further oversight and constraint. The U.S. response to terrorism has been multifaceted and expansive, reflective of the U.S. role in global security, and is an ongoing work in progress. Branches of the federal government and the public question and redefine their obligations and roles in upholding security while safeguarding the rule of law, and the debate over the appropriate course of action on these matters will no doubt continue for the foreseeable future.

""' See, e.g., Setty, Judicial F'onnalism, supra note 189, at 1643-5, 1652-3. See, e.g., Andrew Erickson and Austin Strange, China Has Drones. Now What? foreignaffairs.com, May 23, 2013, available at http://www .foreignaffai rs. com/arti c lesii 39405/andrew-eri ckson-an d-austin-strange/ china-has-drones-now-what (raising questions as to how China will deploy its military drone capability).